Vinicio Vercellone, Torino IT

Vinicio Vercellone, Torino IT

Patent application number

Description

Published

20080316914

Method and System for Fault and Performance Recovery in Communication Networks, Related Network and Computer Program Product Therefor - A system for fault and performance recovery in a communication network includes a set of network apparatuses as well as a plurality of sites connected by means of connections having a given topology. The network also includes routers for implementing given routing policies and has associated therewith at least one database maintaining information regarding the network apparatuses. The system includes test modules for executing performance tests created automatically by exploiting the information available on the topology of the connections between the various sites and by accessing the database in question. The test modules are configured for analysing the results of the performance tests to detect possible fault and performance impairment conditions of the network. In the presence of a fault and performance impairment condition detected in the network, the routers modify the routing policy to compensate for the fault and performance impairment condition.

12-25-2008

20090109862

Method for Reducing Fault Detection Time in a Telecommunication Network - A method for reducing fault detection time in a network includes routers configured to exchange messages via at least one switch to check mutual reachability, each message including a list of routers reachable from the sending router. The method includes snooping, by the switch, a message from a router to extract the list of routers reachable from the router; and, when a network fault occurs that prevents the router from being reachable via the switch, sending, by the switch and to all the other routers connected to the switch, a network fault message including an empty list of routers, so that the receiving routers, not seeing their own identifier in the list, declare the adjacency with the sending router closed, and proceed to reroute traffic on a new route.

04-30-2009

20090125995

Method and System For Accounting Access by Users to Data Networks, Related Computer Program Product - A system for the time-based accounting of access by users to services provided by a data network includes a primary access node to provide access by users by establishing via the primary access node a steady connectivity between the users and the network. A secondary access node is associated with the primary access node, such secondary access node being configured for acting as a backup node to maintain connectivity in the case of failure involving the primary access node. The primary access node is configured for issuing a request for credentials for any user requesting access to said data network and, as a result of receiving valid credentials from the user, starts time-based accounting for the user. An authentication node cooperative with the primary access node and the secondary access node stores the secondary access node information items concerning the time-based accounting started for the user. The time-based accounting is thus maintained in the case of failure involving the primary access node as connectivity is maintained by the secondary access node.

05-14-2009

20090285090

Method and System for Providing User Access to Communication Services, and Related Computer Program Product - A system for providing to users of data communication services access to a communication network providing these services, includes an edge node of the communication network providing these services as well as a packet network, such as, an ethernet connecting the users to the edge node. The packet network is equipped with operation and maintenance procedures for preserving edge connectivity over the packet network. The edge node has associated therewith a backup edge node providing access to the communication network. Preferably, the backup edge node is reachable by the users via the packet network by using an address common to the edge node and the backup edge node associated therewith. In the presence of failure of the edge node, connection is established between the users and the backup edge node by applying the operation and maintenance procedures. Preferably, this, occurs by using the address common to the edge node and the associated backup edge node.

11-19-2009

20100309785

ADMISSION CONTROL IN A TELECOMMUNICATION NETWORK - A method and system for performing admission control in a packet-based telecommunication network includes a backbone network coupled between at least two access networks. When a first user on a first access network wants to communicate with a second user located on a different access network, a request is made to a quality server whether network resources are available. The quality server separately monitors both access networks and the backbone network and determines whether network resources are available to satisfy the request. In one embodiment, a two-tier approach is used wherein a coordinator module interacts with an admission control subsystem including a plurality of subsystem modules. Each admission control subsystem module is responsible for monitoring a part of the network, such as, one access network or a backbone network. The coordinator module determines which subsystem modules are associated with the user request and interrogates such subsystem modules as to resource availability.

12-09-2010

20110047612

Method for Network Access, Related Network and Computer Program Product Therefor - A method of providing access of a mobile terminal to an IP network includes establishing a security association between the mobile terminal and a first security gateway of a first router in said plurality of routers. The mobile terminal is provided access to the IP network via the first router, and the data exchanged between the mobile terminal and the first router is encapsulated by using the security association. The security association is made available to at least one second router having a second security gateway. The mobile terminal is provided access to the IP network via said the second router, and data exchanged between the mobile terminal and the second router is encapsulated by using the same security association. Establishing the security association includes assigning a Security Parameter Index that identifies univocally the first security gateway and the security association. Making the security association available to the second router includes making available to the second router the Security Parameter Index. The second router may thus have access to the security association either by requesting it from the first router or by identifying it in a set of security associations sent from the first router to a set of routers candidate to become the second router as result of the mobility of the mobile terminal.

02-24-2011

20120221646

CACHING OF DIGITAL CONTENTS IN P2P NETWORKS - A method for enabling sharing of content files among nodes of a P2P network is provided. The P2P network comprises sub-networks each including a respective plurality of nodes capable of storing content files. Each sub-network has an associated corresponding hash table for indexing the content files stored in the nodes of the sub-network. The hash table is distributed among at least some of the nodes of the sub-network. The method comprises, for each content file stored in at least one node of a sub-network, storing in the hash table associated with the sub-network a criticality index providing an indication of the degree of sharing of the content file among the nodes of the sub-network. The method causes a node to cache at least one content file for sharing with other nodes of the sub-network based on the criticality index of the at least one content file.

08-30-2012

20120221647

SHARING OF DIGITAL CONTENTS IN P2P NETWORKS EXPLOITING LOCALIZATION DATA - A method for enabling sharing of content files among nodes of a P2P network is provided. The P2P network comprises sub-networks each including a respective plurality of nodes capable of storing content files. Each sub-network has an associated corresponding hash table for indexing content files stored in the nodes. The hash table is distributed among at least some of the nodes of the sub-network. For each content file stored in at least one node, the hash table comprises a corresponding node list of the sub-network nodes which store the content file. The method comprises associating each node of the sub-network listed in the node list corresponding to a content file with localization data indicating the localization of the node within the sub-network. The localization data defines a corresponding preferential list of the nodes storing the content file for downloading the content file by a requesting node.